The success factor: each installation has the approval of the citizens living in the area under video surveillance.



Similar documents
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

TERRACENTRO Communication

Financial Corridors. Directo a México Conference December 1-2, Atlanta, USA

Perspective from an European Union Country

29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States

An Open and Safe Europe What s next?

Setting the legal context for telemedicine in the EU

Strategic targets board as a management tool for Spanish road safety

2013/2014 UCAM MASTER IN BUSINESS ADMINISTRATION (MBA) OFFICIAL TITLE (60 ECTS)

Online Ads: A new challenge for privacy? Jörg Polakiewicz*

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

The Risk Prevention Management System of the European Commission's staff

A customer s guide to BS 8418 detector-activated remotely monitored CCTV systems

Mental Health Declaration for Europe

How To Understand And Understand The European Priorities In Information Security

Central termoeléctrica Zona Franca Celsia- Barranquilla, Atlántico. Conference call 2Q 1S July 23rd

Assise de la Justice Brussels, 21 & 22 November Presentation by Maura McGowan QC Chairman of the Bar Council of England and Wales

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

How To Regulate Data Protection In European Union

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

The History of the EU Speakers Conference. The history of the EU Speakers Conference includes four different stages.

Eurojust s Multi-annual. Strategic Plan Organisational developments. Centre of expertise. Operational work. Partners

CURRICULUM STANDARDS / STUDENT OUTCOMES

Horizonte 2020 SMART CITIES EN WP 2016

Version 56 (29/11/2011)

FP (a.k.a. MOMENT)

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

The European Lotteries

Do you have a private life at your workplace?

Tilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 February /05 LIMITE COPEN 35 TELECOM 10

Videoconferencing in Crossborder Court Proceedings. Facilitating the Use with Documentation

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

THOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE Privacy, data retention and state surveillance: Digital Rights Ireland.

Guidelines on data protection in EU financial services regulation

Analysis of the power production of a Wind farm with consumption associated for desaled water for agriculture, in Gran Canaria

The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU

Computer Facilitated Crimes Against Children International Law Enforcement Training

Encuesta de Expectativas Económicas al Panel de Analistas Privados

Helsinki Metropolitan Area Adaptation Strategy Susanna Kankaanpää Helsinki Region Environmental Services Authority

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.

Georgia. Progress Report

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

Information Governance Policy

Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

COMMISSION RECOMMENDATION. of XXX. on the right to legal aid for suspects or accused persons in criminal proceedings

Honourable members of the National Parliaments of the EU member states and candidate countries,

COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)

EUROPARC-Spain and the Spanish system of Protected Areas

BCS, The Chartered Institute for IT Consultation Response to:

APPENDIX THE EUROPEAN LOTTERIES SPORT CHARTER 2012

Microsoft s cybersecurity commitment

Data Retention Law in EU - A Review

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters

ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY

Cyber Security Strategy for Germany

7 August I. Introduction

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

Report on Privacy and Personal Data Protection in the European Union

AD 13/15 CONF-RS 2/15 1

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

Organization of the Health Care System in Spain

Panel 1. Greater Regulation of Special Threats to Privacy. Data Protection in the 21st Century

Circulating Vehicle Fleet study City of Madrid (2013)

SPAIN S LOCAL & REGIONAL ELECTIONS 24M RESULTS AT-A-GLANCE KEY FACTS

Cloud Computing and Privacy Laws! Prof. Dr. Thomas Fetzer, LL.M. Technische Universität Dresden Law School

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Cloud Video Surveillance Platform for Safe City Projects

Tentative Action Plan

October 2013 VIGO ITS TEST BED. Francisco Sánchez / Rosa Blanco Centro Tecnológico de Automoción de Galicia. Electronics & ITS Division

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

RECOMMENDATIONS COMMISSION

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 3 June /13 LIMITE ASIM 45 COMIX 347

Critical Infrastructures and Challenges for Enhanced Security and Network Management Dr. Ioannis Chochliouros Evangelos Sfakianakis

Table of contents. Frame of the cards: identical structure for each country

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION STAFF WORKING DOCUMENT. Annex to the: Proposal for a

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

Privacy in Surveillance Systems in Banking and Finance Call Centers

How To Protect Your Website From Copyright Infringement

Security Audit VIS Central System. Summary Report

One patient one record

Committee on Petitions NOTICE TO MEMBERS

(Legislative acts) DIRECTIVES

Reform of the Italian Public Administration. e Gov 2012 : Italy s Action Plan for

EU Security Research Project F O C U S Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles

DBA Group Srl Web Based Applications & Software Solutions

Data Protection Breach Management Policy

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

Network Resource Management Directive

REACT XIX EDITION. Experts in Rapid Co-operation and Assistance for Conflict Prevention Operations, Crisis Management and Post Conflict Rehabilitation

2009 TRIAL HIGHER SCHOOL CERTIFICATE EXAMINATIONS LEGAL STUDIES MARKING GUIDELINES

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Network Resource Management Policy

Transcription:

Social and Legal Aspects related to CitizensEmpowering Sara Gutierrez, Madrid City Council Instead: Judith Pertejo, ISDEFE (Coordinators of SafeCity) Aalborg, 10 th May 2012

Madrid City Council example Video surveillance systems are efficient decrease the criminality percentages Demanda real del ciudadano Comparison al al 092 2009 o 112-2010 en zona videovigilada Incidents before/after surveillance systems installation 4500 4500 4000 4000 3500 3500 3000 3000 2500 2500 2000 2000 1500 1500 1000 1000 500 500 00 ENERO ENERO FEBRERO FEBRERO MARZO MARZO ABRIL ABRIL MAYO MAYO JUNIO JUNIO 092 0922009 2009 092 092 2010 2010 15% 10% 5% 0% -5% -10% -15% -20% Difference Variación of porcentual percentage en la Tasa on de the criminalidad criminality conocida rate from Periodo 2003/2009 2003/09 Ministry of the Interior 9,5% Madrid City Ciudad Council Resto Madrid de Comunidad Region Resto Spain de España -4,6% -18,3% The areas where the video surveillance systems have been installed had been carefully analyzed from the social point of view, taking into account (among others indicators) the crime rate of the area. 2 The success factor: each installation has the approval of the citizens living in the area under video surveillance.

Madrid City Council example What citizens perceived? 7 6, 9 6,8 6,6 6,5 6,4 6,2 6 5,8 5,6 5, 9 6, 2 6, 2 2 0 0 5 2 0 0 6 2 0 0 7 2 0 0 8 2 0 0 9 5,4 5,2 5 Value of the security g rad in o the d e district s e g u riof d aresidence d e n el d iperceived s tri to by the citizens Citizens feel much safer year by year in Madrid. Every year The Security Observatory of the city launches a survey to measure how Madrid citizens feel about security and safety. There has been many strategies carried out by Madrid City Council in order to achieve these results, the technological ones like video surveillance have been one of them, and they have contributed to the final results. 3 Aalborg 10/05/2012

Madrid City Council example Social involvement and citizens support benefit Public Safety services while deploying certain new ICT systems, as the case of video surveillance in the streets. Two basic premises are considered: To be an answer for the demand of the society the installation of cameras in any area of Madrid is considered only if the neighbors of that area demand to do so. To be under the legal framework any system installed has to be compliant with the legal national framework, which is mandatory. 4 Aalborg 10/05/2012

Data protection by Design Emerging citizens-centric platforms and internet-based capabilities offer great benefits to the society, also help to enhance Public Services. ICT must generate TRUST Reliability, Security and Protection of personal data must be guaranteed Data protection and privacy should be considered from the very start of a new technology. helps to achieve a more proactive approach to security. ensures no data is collected without the prior identification of a set business purpose. 5 Aalborg 10/05/2012

Legal considerations However, different laws across EU Member-States E.g. SafeCity(www. safecity-project.eu) where MCC is involved: Takes into consideration legal, ethical and social implications while designing a new capability: Research on EU policies concerning individual rights. Research on EU/National regulations wrt. handling sensitive data. Analysis on social implications regarding surveillance systems automations and ICT Technologies. Madrid, Lisbon, Bucharest or Helsinki allow Video surveillance is allowed for security purposes Stockholm or Athens just allow video surveillance for traffic monitoring 6 Aalborg 10/05/2012

Legal and Ethical Regulations Human Rights Perspective EU Legal Framework for Telecommunications Ethical Principals EU Legal Framework for the Right of Data Protection EU Convention on Human Rights (ECHR) Charter of Fundamental Rights of the EU (CFREU) Treaty of Lisbon on the Functioning of the EU (TFEU) Directive 97/66/EC, Directive 2002/58/EC, Directive 2006/24/EC, Directive 2009/136/EC EU Principles raised by EU Directorate General for Research European Legislation Framework. Directive 95/46/EC Regulation (EC) No45/2001 Council Framework Decision 2008/977/JHA REFORM OF DATA PROTECTION LEGISLATION recently proposed by EC. It strengths individual rights and tackles the challenges of harmonizing EU regulations. Explicit inclusion of the term in Data protection by design and by default (Art. 23) 7 Aalborg 10/05/2012

Thanks to all!!